21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ii<br />

often ad hoc and transient nature of communication relationships. Thus, novel<br />

mechanisms are required that provide a sufficient level of security while respect<strong>in</strong>g<br />

the constra<strong>in</strong>ts <strong>in</strong> wireless sensor networks.<br />

Our thesis is that key pre-distribution is an appropriate technique <strong>for</strong> secret<br />

key agreement <strong>in</strong> wireless sensor networks, and that based on locally shared<br />

keys, multi-hop communication can be adequately protected us<strong>in</strong>g an <strong>in</strong>terleaved<br />

message authentication scheme.<br />

We argue that comb<strong>in</strong>ed key pre-distribution schemes provide a feasible<br />

mechanism <strong>for</strong> key agreement <strong>in</strong> wireless sensor networks. They require only<br />

simple operations on sensor nodes and their memory requirements can be adapted<br />

to the required security level and the available resources. Based on keys<br />

shared between nodes with<strong>in</strong> a k-hop neighbourhood (with small k), a message<br />

authentication scheme is devised that allows <strong>for</strong> the secure transmission<br />

of messages over long distances. In particular, our contributions are:<br />

• A key establishment scheme <strong>for</strong> pairwise key agreement that can be efficiently<br />

implemented on resource-constra<strong>in</strong>ed wireless sensor nodes and<br />

provides resilience aga<strong>in</strong>st node capture attacks.<br />

• A message authentication scheme that relies on locally shared keys and<br />

symmetric cryptographic operations only, and provides a level of security<br />

approximat<strong>in</strong>g that of end-to-end security mechanisms. The foundation<br />

of the scheme’s security is the creation of multiple disjo<strong>in</strong>t authentication<br />

paths.<br />

• An evaluation of this authentication scheme show<strong>in</strong>g that it provides at<br />

least the same security level as a general communication scheme that relies<br />

on multiple disjo<strong>in</strong>t physical paths.<br />

The proposed security mechanisms protect the <strong>in</strong>tegrity of messages that are<br />

exchanged with<strong>in</strong> a wireless sensor network. The achievable level of security is,<br />

given an attacker with moderate strength that is only able to capture a fraction<br />

of all nodes, comparable to that provided by end-to-end security mechanisms<br />

at a significantly lower cost <strong>in</strong> terms of computational resources.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!